NC Scout (AKA Brushbeater) hosted a course on: privacy-security-anonymity
I took the iteration held in Mid Sept. He holds many different courses
which I have not seen taught anywhere else:

https://brushbeater.wordpress.com/training-courses/

Class size is limited, in part due to the restrictions on bed
space in the home. His classes are taught out of his home and
food and lodging are provided. The food was excellent
including a NC BBQ on Saturday evening.

I was surprised to see serious non-millitary students from all
over and all walks of life. There was a recently retired couple,
a gentlemen from NH who had taken a Tom Givens class with me, a
nearly retired LEO.

The class I took was focused on techniques to make data
collection about you and difficult. There were suggestions for
all parts of your life including computer usage, credit cards,
cell phone use, automobile registration.

The instructor both had a professional background in this
subject (occonus military tracking of terrorists) as well as being
personally interested in limiting all knowledge about himself
that companies can gather.

There was a huge amount of information that was presented that
was not available anywhere else. None of his suggestions would be
easy to perform and would require a great amount of discipline, I
do not expect to personally invest the time and effort to use
this information. Kilo stated that this would have to become a
lifestyle to use properly and would take years to implement.

However it was a great class and I would definitely take another
NC Scout/Brushbeater class again should something he is teaching
catch my eye. Every effort was made to answer student questions
engage in dialog, provide a homey atmosphere to facilitate
discussions. Both Kilo and NC scout are passionate about teaching
and eager to get as much realistic information into the hands
of the general public as possible.



This was the course description

https://brushbeater.wordpress.com/20...-24-25-august/


Taught by Kilo, a friend and current member of the SOF community, this is a course normally only offered to Special Operations Personnel. But the information needs to be out there for those willing to take advantage of it.

His description:

Noah built the ark before the flood. This course will instruct the student on how to proactively prepare for the day when they may be unexpectedly or unavoidably exposed and their persona or that of their family exploited with nefarious intent by malign actors. Digital force-protection, identity management, and the minimization of online signatures will be thoroughly covered in multiple tiered levels. Awareness regarding the tracking and fingerprinting of digital devices will be explained and countermeasures to mitigate their effectiveness will be learned.

In this course, a few of the topics students will learn are to:

• Understand the difference between security, privacy, and anonymity

• Protect yourself and your family from identity thieves, cyber-criminals, hackers, and terrorists

• Utilize threat modeling to identify attack surfaces and mitigate vulnerabilities

• Compartmentalize activities to reduce the risk of total exploitation in both the digital and physical environments

• Utilize countermeasures to mitigate the exploitation of your personal metadata

• Shield your homes, vehicles, and other assets from public exposure

• Mitigate cell phone surveillance and online tracking

• Configure your home hardware firewall with a VPN kill-switch to completely protect your data transmissions

• Secure both data at rest and data in motion from exploitation

• Apply misinformation and disinformation techniques to mask your true identity from the public

• Make low-profile financial transactions both online and in person without risking exposure of personal details

• Ensure personally identifying information is not disclosed during public data breaches

• Remove personal information from the multitude of publicly available online sources

• Change your future habits to support your personal privacy and anonymity and that of your family

-and many other topics.

This course will be taught in a group discussion format where there will be an open dialogue between the instructor and students in order to ensure a deeper understanding of the topics discussed that a lecture style of instruction does not allow for. Students will have ongoing personal access to the instructor after the course concludes for follow on questions and updates to the curriculum as technology changes.

Students are encouraged to bring:

Note taking material, Laptop (with extension cords), Regular digital camera (not cellphone), at least two 4GB thumb drives.